changin the password may not be enough - granted it may lock out an attempted hack on a specific userid, but unless you have effedctively secured the device and its on a network then its potentailly open season
remove any programas you dont need that exisit on the server (especailly comminuications services like ftp http netbui etc.)
close down all TCP:IP ports you dont need. unless you need a specific port service then close it
hide the servewr behind a firewall so its harder for attackers to see it. consider using a means of limiting access to known IP / user combinations IE userid fred cxan only access that server from IP X, or IP range X...y
In essence the only secure server is one that isn't powereed up, preferably in a room filled with concrete. outside of that you need to be endlessly vigilant - keep looking at thise log files, keep looking at those security wrning sites, keep updating the system.
2006-09-04 05:27:13
·
answer #1
·
answered by Mark J 7
·
0⤊
0⤋
Im guessing you have a dedicated web server, that is hosted by a hosted company on your behalf. In this case the IT staff will have their own domain passwords to gain access.
2006-09-04 05:21:12
·
answer #2
·
answered by Dale W 2
·
0⤊
0⤋
If a hacker gets in and creates their own passwords then they can access it at any time regardles of how many times you change password, and no matter how up to date the software is.
2006-09-04 05:23:32
·
answer #3
·
answered by Hazza 3
·
0⤊
0⤋
Just make sure you are fully patched up, up 2 date anti virus etc.
If its a web server just observe basic security principles. ie our Guest account was vulnerable and we got hacked (i wont tell you who i work for, but its a household name and we should have known better)
I can advise further if you want to contact me.
2006-09-04 05:21:36
·
answer #4
·
answered by Dark_Mushroom 4
·
0⤊
0⤋
do you want to be alittle more specific. Dedicated server for what? On the internet? on a LAN? ?
2006-09-04 05:15:54
·
answer #5
·
answered by sharper 2
·
0⤊
0⤋
Yeah but they would need a defragger X-series producing method from zone 3. But only Bill Gates has one of those. haha.
2006-09-04 05:16:31
·
answer #6
·
answered by Falcone 2
·
0⤊
0⤋
Depends on
- what you're using it for
- what type of default access you have set up
- operating system
- connectivity
2006-09-04 05:16:44
·
answer #7
·
answered by Robert C 3
·
0⤊
0⤋